TrigGuard
TRIGGUARD Verify

Verify Receipt

Paste a TrigGuard receipt to verify the Ed25519 signature locally. Browser-side check—no receipt payload sent to TrigGuard for verification.

TRACE_ID TG-A7C192B
REQUEST
ACTOR: finance-bot
ACTION: transfer_funds
AMOUNT: $50,000
AUTHORIZATION
Policy: irreversible-financial
Decision: DENY
RECEIPT VERIFIED · Action blocked · Audit committed
[INFO] Initializing Ed25519 verification...
[INFO] Fetching public key from /.well-known/trigguard-keys.json...
[INFO] Comparing hash signatures...

Execution Receipts and Independent Verification

Execution receipts are self-contained proof of what TrigGuard evaluated and decided. With cached public keys, verification is local and independent: teams can validate integrity without calling TrigGuard during audits or incident review.

1. Fetch Keys Once

Load public keys from /.well-known/trigguard-keys.json. Cache locally.

2. Parse Receipt

Extract the signature and key_id from the receipt JSON.

3. Verify Receipt

Use Ed25519 to verify the signature against the canonical payload.

4. Check Expiry

Ensure the receipt hasn't expired (check expires_at field).

Signature Verification and Integrity

TrigGuard publishes signing keys at a well-known URL so signatures on receipts can be validated cryptographically. Keys rotate periodically while prior keys remain available long enough to verify historical receipts.

GET https://api.trigguardai.com/.well-known/trigguard-keys.json

Key Rotation

Keys are rotated quarterly. Deprecated keys remain available for 90 days after rotation to allow verification of older receipts.

Why Verification Matters for Automated Decisions

Verification does not require TrigGuard to be online. Your audit trail is cryptographic proof of policy outcome, not a live query to a control plane. This makes execution decisions independently verifiable across CI, runtime, and compliance workflows.

Network Required Only for key discovery (cacheable)
Verification Location Your infrastructure (offline)
Algorithm Ed25519
Key Format Base64-encoded public keys

DEMO MODE — This page demonstrates the verification flow using example keys. Production verification requires fetching your organization's actual public keys from /.well-known/trigguard-keys.json.

Receipt model · Verification docs · Gate authorization · Verify product